wiby  
Settings



Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day

The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)

https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html

Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based

Linux Security Hardening and Other Tweaks

https://vez.mrsk.me/linux-hardening

As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.

portal.goeshard.org

https://portal.goeshard.org/

from Dann's old computers with pop culture blogging reminiscent of X-Entertainment. Dann has some very old sites that are still up too. e/n : https://dannarchy.com/en movies

Windows XP Guide

http://www.prints.pink/unlisted/windowsxp.html

(or using two separate computers, if you prefer). You might also want to look into the One Core API for Windows XP, although I won't be discussing it here as I know nothing about

The Power of Centralization

https://secushare.org/centralization

than that, almost all computers share the problem of "downstream abuse", so the only ultimate way to protect something from your friends is to not share it online. Top

~hl

https://www.devever.net/~hl/

20221029 computing Computers are an inherently oppressive technology 20220612 computing The Demise of the Mildly Dynamic Website 20220502 computing Website redesign and editorial

Vulonkaaz's links

https://vulonkaaz.zip/links.html

be useful for school computers or whatever) Eaglercraft : Minecraft Java ported to web browser, lower performance than native java of course but it's crazy it even works, even hav

DX LISTENING DIGEST AUGUST 2003 ARCHIVE

http://www.w4uvh.net/dxldtd3h.html

such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi

NLnet; All projects

https://nlnet.nl/project/index.html

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent


Find more...